Positioning and Presenting Design Science Research For Maximum Impact
Positioning and Presenting Design Science Research For Maximum Impact
Positioning and Presenting Design Science Research For Maximum Impact
Behrooz
They have also developed a publication schema for DS research studies composed
of seven components and elaborated that any DSR should cover which type of
contents in its introduction, literature review, method, artifact description,
evaluation, discussion, and conclusion part.
The main goal of this article is to advance a meta-theory to specify the fundamental
characteristics of IS security training and to separate this kind of training from other
forms and then to show that according to the theory, none of the extant IS security
training practices meets all the requirements proposed in the theory and
consequently to demonstrate how we can design IS security training approaches
that meet all the requirements.
After clarifying the aims of the study, the authors discuss the extant IS security
training approaches (32 approaches) proposed to improve employees compliance
with IS security policies and argue that these approaches can be divided into seven
categories (i.e. psychological training, security awareness programs, situational
approaches, etc.). They have also mentioned the key findings and the underlying
theory of each approach. They then argue that while previous studies have
emphasized the importance of IS security training, no study has attempted to lay
down fundamentals of this kind of training and that a meta-level examination of the
fundamental nature of IS security training is needed before selecting any
pedagogical theory for IS security training approaches.
The next section deals with advancing a new meta-theory for designing IS security
training approaches. The authors first argue that among various theory types in IS
research (i.e. analysis, explanation, prediction, explanation and prediction, and
design and action (or Design Science)), a proper theory for IS security training
approaches should fall in the last category (i.e. Design Science) as the ultimate
objective of IS security training is design and action. They then apply Hares metatheory of three levels of thinking (i.e. meta-level thinking, critical thinking level, and
Behrooz
intuitive thinking level) as a both descriptive and prescriptive theory to sketch the
structure of their new meta-theory.
In the meta-level thinking they discuss the fundamental characteristics of IS
security training and they argue that it differs from other forms of training due to its
nature
(non-cognitive,
persuasive,
and
focus
on
routine
activities)
and
Using
learning and
by adding
Behrooz
The main aim of this study is to propose six design theories for IS security policies
to tackle with the exceptional situations (i.e. the situations in which the
organizations have to temporarily violate their IS security policies in order to take
advantage of unexpected business opportunities).
The authors first elaborate an IS security policy design theory framework. They
argue that IS security policies and guidelines should be equipped with application
principles to address the exceptional situations. They advance that a design theory
for IS security policies needs to have three criteria: (1) be based on kernel theories.
(2) Offer normative guidance for practitioners on how to design and apply such
policies. And (3) propose testable hypotheses for scholars. Following that they have
Behrooz
scrutinized the extant IS security policy studies and state that almost none of them
address the second criteria (offer guidelines to cover exceptional cases).
The next section discusses philosophical normative theories and introduces six
normative theories (conservative deontological, liberal-intuitive, Prima-facie, virtue
ethics, utilitarian, and universalizability theories) as kernel theories for IS security
policies and guidelines. The authors argue that normative theories are the best
option for kernel theories as they ponder what people should do instead of
investigating what people do (that is the case for empirical social sciences). A real
case is used to illustrate how the six normative theories prescribe actions for that
case.
In the last section of the paper, the authors by introducing the concept of Total Cost
of Security Actions (TCSA) describe the six mentioned normative theories as
potential bases for design theories for IS security policies and guidelines. Each
design theory is described by mentioning four key factors: (1) the kernel theory. (2)
Meta-requirements. (3) Application principles, and (4) Testable design product
hypotheses.
At the end, practical and research implications of the proposed theories are
discussed and some preliminary ideas for measuring the constructs in order to test
design product hypotheses are suggested by the authors.
Behrooz
The paper begins by reviewing
modules,
and
informational
sources)
are
incorporated
in
this